Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 12:48
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
Melonity.7z
Resource
win7-20241023-en
windows7-x64
10 signatures
150 seconds
General
-
Target
Melonity.7z
-
Size
75.8MB
-
MD5
19d13cc25d3df6877e1cff173f4f7e19
-
SHA1
0c8fc7c0135f08587d16d3e525466d02181b3603
-
SHA256
3cfc46b4322ca60c012b069e781d8dab86d778e508441848b442d873a47a450d
-
SHA512
31790f097a351bd2c3097207bf1378c7b08f0cf8da2e6227e915e2f40f7a6755f441c7a89eb630a029641b1786917afb3fd8ae48456b3f32603ece7c2c35d5e6
-
SSDEEP
1572864:K+pi9HqhhRBVIsh7ckOwTbFZlROpHou2U1bSOWpQQYcEiTS4o:ri65BLTbFZlROFo32gQQYTia
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2752 Melonity.exe 2760 WeMod.exe 2016 Sirus.exe -
Loads dropped DLL 4 IoCs
pid Process 2752 Melonity.exe 2752 Melonity.exe 2752 Melonity.exe 2752 Melonity.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2760 WeMod.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Melonity.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2760 WeMod.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2556 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 2556 7zFM.exe Token: 35 2556 7zFM.exe Token: SeSecurityPrivilege 2556 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2556 7zFM.exe 2556 7zFM.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2760 2752 Melonity.exe 33 PID 2752 wrote to memory of 2760 2752 Melonity.exe 33 PID 2752 wrote to memory of 2760 2752 Melonity.exe 33 PID 2752 wrote to memory of 2760 2752 Melonity.exe 33 PID 2752 wrote to memory of 2016 2752 Melonity.exe 34 PID 2752 wrote to memory of 2016 2752 Melonity.exe 34 PID 2752 wrote to memory of 2016 2752 Melonity.exe 34 PID 2752 wrote to memory of 2016 2752 Melonity.exe 34
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Melonity.7z"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2556
-
C:\Users\Admin\Desktop\Melonity\Melonity.exe"C:\Users\Admin\Desktop\Melonity\Melonity.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Roaming\WeMod.exeC:\Users\Admin\AppData\Roaming\WeMod.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2760
-
-
C:\Users\Admin\AppData\Roaming\Sirus.exeC:\Users\Admin\AppData\Roaming\Sirus.exe2⤵
- Executes dropped EXE
PID:2016
-